Your message dated Thu, 06 Nov 2025 19:32:11 +0000
with message-id <[email protected]>
and subject line Bug#1113776: fixed in malcontent 0.13.0-2+deb13u1
has caused the Debian Bug report #1113776,
regarding Downstream Debian/Ubuntu patch breaks flatpak app listing in 
malcontent
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact [email protected]
immediately.)


-- 
1113776: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1113776
Debian Bug Tracking System
Contact [email protected] with problems
--- Begin Message ---
Package: malcontent
Version: 0.13.0-2

The downstream patch `all_apps.patch` carried in (at least) malcontent
0.13.0-2 contains a bug which causes all flatpak apps to be omitted
from the ‘restrict applications’ list in the UI, making malcontent
ineffective for systems using flatpak.

The patch is viewable online here:
https://sources.debian.org/patches/malcontent/0.13.0-2/all_apps.patch/

The bug was discovered/diagnosed in the upstream issue here:
https://gitlab.freedesktop.org/pwithnall/malcontent/-/issues/99

The patch pulls the `executable` variable in `reload_apps()` out to a
higher scope, but omits to set a value for it in the
`g_desktop_app_info_has_key (G_DESKTOP_APP_INFO (app), "X-Flatpak")`
case. It then filters out all apps with `executable` unset, which ends
up being all flatpak apps.

---

Given that the patch says it’s for `Bug:
https://gitlab.freedesktop.org/pwithnall/malcontent/-/issues/58`, it’s
disappointing that the patch wasn’t submitted upstream even though I
said I was open to such contributions
(https://gitlab.freedesktop.org/pwithnall/malcontent/-/issues/58#note_2035099).

Review upstream would have quickly caught this issue.

It’s even more unfortunate that the patch then happened to break
support for all flatpaks, when it was adding support for snaps.

--- End Message ---
--- Begin Message ---
Source: malcontent
Source-Version: 0.13.0-2+deb13u1
Done: Jeremy Bícha <[email protected]>

We believe that the bug you reported is fixed in the latest version of
malcontent, which is due to be installed in the Debian FTP archive.

A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to [email protected],
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Jeremy Bícha <[email protected]> (supplier of updated malcontent package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing [email protected])


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

Format: 1.8
Date: Tue, 04 Nov 2025 18:30:33 -0500
Source: malcontent
Built-For-Profiles: noudeb
Architecture: source
Version: 0.13.0-2+deb13u1
Distribution: trixie
Urgency: medium
Maintainer: Debian freedesktop.org maintainers 
<[email protected]>
Changed-By: Jeremy Bícha <[email protected]>
Closes: 1113776 1120080
Launchpad-Bugs-Fixed: 2128350
Changes:
 malcontent (0.13.0-2+deb13u1) trixie; urgency=medium
 .
   * Team upload
 .
   [ Alessandro Astone ]
   * Fix filtering snaps after snapd 2.72 (Closes: #1120080, LP: #2128350)
   * Fix listing flatpaks in parental control UI (Closes: #1113776)
   * Fix memory leak when checking snaps
Checksums-Sha1:
 1e3b717bdd751e46d79e296803407839885d8cee 3667 malcontent_0.13.0-2+deb13u1.dsc
 876a162baaf6331564d7f64ad1d5183e703a8576 8336 
malcontent_0.13.0-2+deb13u1.debian.tar.xz
 4320b91109c3a83f0e7ee699b193371248eee6fa 17912 
malcontent_0.13.0-2+deb13u1_source.buildinfo
Checksums-Sha256:
 f175097e2513e975b15dca5f878d7ce8f083025fcbfd59ddbeead79ec61d730c 3667 
malcontent_0.13.0-2+deb13u1.dsc
 9c736b4b6d5d561f64af8f9d39e1cc6d7dcd46fec0ebd9ac01ff97369981ab4b 8336 
malcontent_0.13.0-2+deb13u1.debian.tar.xz
 0d15459865419ed59620ec16254d3099c668c1bd40449fd7f7c1bdb6dc8b33a4 17912 
malcontent_0.13.0-2+deb13u1_source.buildinfo
Files:
 534683843dc34c7f4a2958a4cf47dd07 3667 admin optional 
malcontent_0.13.0-2+deb13u1.dsc
 5a79a78aea5d006db39bf5bd0a065526 8336 admin optional 
malcontent_0.13.0-2+deb13u1.debian.tar.xz
 264142c5bc66fbecdff0a88d1eab4922 17912 admin optional 
malcontent_0.13.0-2+deb13u1_source.buildinfo

-----BEGIN PGP SIGNATURE-----

iQIzBAEBCgAdFiEETQvhLw5HdtiqzpaW5mx3Wuv+bH0FAmkLzsUACgkQ5mx3Wuv+
bH1+ZQ/8CBeRhpmJUKsY2YLjsYBFKd3n12H5/8hhMX7Iy7St/UrXqNYSZQzDcjOc
/2cCiGliGcmfIVarnp7jfn0ajNo4SkxDKH6CZoxPCWAx1nyU5D5WzNz1UBJ0XqqW
VtB50t5WumSF5nL91T0PJGms4EiT3If1ZSnzbbdY9YYgPW8576RtOb2zhkgPjf+D
SMbslWSIGFShZbBVSoLCiZm334H0mDC4KyU0B7Ffr/hprl3xdsfT6bhJGPiAzWTS
tsyldUq493a9HInkJeg40sh9Tsh1re45GTTDPgciMZ4OVNF6VUqFlv8ytZ3T7+lG
HFDpRfR9KEePKd3bLzRw/UlsuQZsYRLxpcHK/nmZt51NTpCiW6cLXpZ1lAIDAqZv
Qq+6fruv+Q00h/i9Dskyv2mPJKfpReYZ5wx7rOwFN1qNUjUzPAABzTaEP6zOlSON
VW6nFgR8ImC7GF2kYWHh97dKKPmutEO7gmqY50d74noC/H/estj4d9Qt9g24bXS7
5so007KuDm8OqPZ+0uCRK8dCSuap0Qu6MQKECOkdUJh9C9SilDnhiViFtWAKCJTU
he1Z4QvAbb8UuWrg8AvvyHVihL12PT7ym4S1TFaLL0Zg4TROgtT/RVJGuIvBSTd4
PMvwR/6A725epehb0Xg/aQvwS+gL7uT+X0xnoDCCAiXPDHmAJ5Y=
=u3HU
-----END PGP SIGNATURE-----

Attachment: pgpeDNv8rq1Y2.pgp
Description: PGP signature


--- End Message ---

Reply via email to